Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Next Article in Journal
A Robust-Fitted-Mesh-Based Finite Difference Approach for Solving a System of Singularly Perturbed Convection–Diffusion Delay Differential Equations with Two Parameters
Previous Article in Journal
Dynamic Task Allocation for Collaborative Data Collection: A Vehicle–Drone Approach
Previous Article in Special Issue
A Low-Latency Noise-Aware Tone Mapping Operator for Hardware Implementation with a Locally Weighted Guided Filter
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Universal Image Vaccine Against Steganography

by
Shiyu Wei
,
Zichi Wang
* and
Xinpeng Zhang
School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China
*
Author to whom correspondence should be addressed.
Symmetry 2025, 17(1), 66; https://doi.org/10.3390/sym17010066
Submission received: 6 December 2024 / Revised: 27 December 2024 / Accepted: 31 December 2024 / Published: 2 January 2025

Abstract

:
In the past decade, the diversification of steganographic techniques has posed significant threats to information security, necessitating effective countermeasures. Current defenses, mainly reliant on steganalysis, struggle with detection accuracy. While “image vaccines” have been proposed, they often target specific methodologies. This paper introduces a universal steganographic vaccine to enhance steganalysis accuracy. Our symmetric approach integrates with existing methods to protect images before online dissemination using the Contrast Limited Adaptive Histogram Equalization (CLAHE) algorithm. Experimental results show significant accuracy improvements across traditional and deep learning-based steganalysis, especially at medium-to-high payloads. Specifically, for payloads of 0.1–0.5 bpp, the original detection error rate was reduced from 0.3429 to 0.2346, achieving an overall average reduction of 31.57% for traditional algorithms, while the detection success rate of deep learning-based algorithms can reach 100%. Overall, integrating CLAHE as a universal vaccine significantly advances steganalysis.

1. Introduction

The widespread adoption of multimedia technology has enhanced daily life but also spurred advancements in digital information hiding and encryption. Concealing secret information during communication remains a critical research focus for governments and enterprises. Prominent information hiding techniques include steganography and watermarking [1,2]. While watermarking is primarily employed for copyright protection and the authentication of digital media, steganography facilitates covert communication by embedding secret information within public digital media such as images, text, audio, and video, without attracting the attention of third parties [3,4,5,6]. For example, Li et al. proposed a steganography algorithm based on VVC, which embeds secret information by modifying the partitioning mode of chroma coding units and uses convolutional neural networks to optimize video quality and bitrate [7]. In contrast to cryptography, which encrypts secret information, steganography not only safeguards the information but also conceals the very existence of the communication [8,9].
In the digital era, especially with cloud computing, digital images uploaded and shared by users have become crucial for disseminating and expressing information [10]. The rapid advancement of technology has made digital images indispensable across various fields, including education, research, national security, and personal life. For instance, the HPDH-MI algorithm enhances data transmission security in the e-health domain by embedding secret data in AMBTC-compressed medical images, achieving high payload capacity, image quality, and embedding efficiency, making it ideal for telemedicine applications [11]. Tuo et al. integrated audio encryption with information hiding in image carriers, utilizing multidimensional chaotic maps and GHM multi-wavelet transforms to achieve robust security and diverse applications [12]. Consequently, they have become the primary medium for steganography [13].
Modern steganography algorithms commonly embed secret information into areas of an image that are complex in texture and difficult to detect. This approach minimizes distortion, making changes visually indistinguishable and significantly enhancing the concealment of information [14,15,16,17,18]. These methods are primarily based on content-adaptive steganography designed within the framework of minimizing distortion [19]. By calculating a distortion cost function, they identify pixel locations with the lowest embedding cost and use encoding techniques like Syndrome-Trellis Codes (STCs) [20] to minimize the distortion function, resulting in the final stego image. With the rise in neural networks, deep learning-based steganography algorithms have emerged, such as UT-GAN [21], which employs generative adversarial networks to improve the stealth of information embedding while maintaining high image quality and robustness against steganalysis.
However, the misuse of steganography poses a serious threat to information security and personal privacy. For instance, malicious organizations distribute altered digital images and other multimedia files over the internet to conduct illegal activities [22]. Therefore, researching effective steganography defense strategies is crucial for protecting the information security of digital images transmitted over public channels, leading to the development of steganalysis techniques. Steganalysis primarily relies on analyzing statistical feature differences in images to identify steganographic activities. Traditional steganalysis methods [23,24,25,26,27] capture subtle statistical feature changes in images by constructing rich models and using ensemble classifiers to detect steganography. Since Xu et al. designed a convolutional neural network structure to enhance detection capabilities in steganalysis [28], deep learning-based steganalysis methods have been continuously emerging [29,30]. However, as steganography advances, the accuracy of steganography detection still requires improvement.
In the latest work, the SUDS framework utilizes deep learning techniques to detect and eliminate steganographic content, focusing specifically on the removal of hidden information [31]. In contrast, Chen et al.’s “Universal Watermark Vaccine” employs universal adversarial perturbations for watermark protection, prioritizing watermark security over steganography defense [32]. The “image vaccine” steganography defense mechanism, initially proposed by Li et al., involves injecting vaccine data by modifying pixels and Discrete Cosine Transform (DCT) coefficients [33]. However, its effectiveness is restricted to specific steganography methods. The limitations mentioned have prompted us to develop a more universal solution to safeguard images against the threat of various steganographic techniques. In response, we introduce an innovative “universal image vaccine” to boost anti-steganography capabilities. As shown in Figure 1, injecting this vaccine into images allows the system to more easily detect hidden information.
In practical applications, the majority of digital images are generated from photos taken by users with mobile phones or cameras. Thus, applying the image vaccine as a filter during image capture not only enhances image quality but also bolsters the anti-steganography capabilities of digital images. Our method seamlessly integrates with all steganalysis techniques to protect images prior to their upload to public channels, thereby making steganographic activities more detectable and identifiable by existing detection technologies. This approach effectively enhances the overall detection capability of steganography detection systems.
Our approach does not modify existing steganalysis techniques. Instead, it fortifies images before users upload them to public channels, facilitating the detection of steganographic activities by existing methods and significantly improving the efficacy of steganalysis.
The main contributions of this paper are as follows:
  • We propose a “universal image vaccine” method against steganography. This approach optimizes image quality while improving the accuracy of steganalysis to varying degrees, effectively detecting steganographic operations. When combined with machine learning algorithms, it can achieve a detection success rate of up to 100%.
  • Our method utilizes the CLAHE [34] algorithm as an image vaccine, applicable to all types of steganography and steganalysis methods, including both traditional and deep learning approaches, offering a wide range of applications.
The subsequent sections of this paper are structured as follows: Section 2, ‘Method’, introduces our image vaccine scheme; Section 3, ‘Experimental Results’, presents the experimental setup as well as the results and analysis; and Section 4, ‘Conclusions’, summarizes the research findings.

2. Method

Before uploading photos to cloud environments, users often employ optimization algorithms to enhance image quality. As illustrated in Figure 2, we address practical needs by selecting the CLAHE algorithm as a “universal image vaccine” technique. This is integrated with existing steganalysis methods to create a comprehensive defense system, thereby improving overall steganalysis performance. Specifically, we apply the CLAHE algorithm to original digital images, which not only enhances visual quality but also results in protected digital images.

2.1. The Influence of Image Vaccines on Steganalysis

The “image vaccine” concept, initially proposed by Li et al., [33] presents certain limitations when applied to real-world scenarios. Its efficacy is confined to detection by particular methods, which restricts its broader utility in the field of steganography defense. Recognizing this, we embarked on a quest to develop a universal steganographic vaccine, one that could provide a robust defense against a spectrum of steganographic attacks, including those based on traditional methods as well as sophisticated machine learning algorithms.
Our initial research investigated the effects of image preprocessing on steganalysis. We evaluated basic techniques like sharpening and Wiener filtering on steganographic detectability. While these methods increased detectability, they variably impacted visual quality, rendering them unreliable as a robust countermeasure. We also explored brightness and contrast enhancement, a common image optimization practice, to assess its influence on steganalysis.
We applied traditional histogram equalization (HE) to the 1.pgm and 128.pgm images from the BOWS2 [35] dataset. Referring to Figure 3, this resulted in noticeable color blocks in the sky and significant deviations from the original images. Our experiments indicate that improvements in detection performance often come at the expense of visual quality. Therefore, to enhance detection performance while improving visual quality, we opted for the CLAHE algorithm as an image vaccine method.

2.2. Contrast Limited Adaptive Histogram Equalization

The traditional histogram equalization (HE) algorithm enhances the contrast and clarity of an image, making it appear more vivid and bright. This algorithm works by redistributing the pixel values of the image to achieve a more uniform distribution across the entire range. The process for applying HE to an L-level grayscale image involves the following steps:
  • Compute the gray-level histogram: Count the number of pixels n k for each gray level r k , where k ranges from 0 to L 1 , and L is the total number of gray levels (typically 256).
  • Calculate the probability density function (PDF):
    p ( r k ) = n k N
    where p ( r k ) represents the probability of the k-th gray level, and N is the total number of pixels in the image. The grayscale histogram can be viewed as a probability distribution function.
  • Compute and normalize the cumulative distribution function (CDF) and map the gray levels:
    s k = ( L 1 ) j = 0 k p ( r j )
    This step transforms each pixel’s original gray level r k to the new gray level s k , resulting in the equalized image. Through histogram equalization (HE), the CDF is adjusted to become uniform across its domain, extending the dynamic range of grayscale levels and suppressing those with fewer pixels.
While HE can significantly enhance contrast, it often leads to issues such as noise amplification and inadequate preservation of image details. This occurs because the uniform distribution may excessively enhance contrast in areas with fewer pixel variations, resulting in a loss of detail and increased noise. CLAHE algorithm addresses many of these limitations.
CLAHE is an advanced image processing technique designed to enhance local contrast in images. It works by dividing the image into multiple small blocks and performing histogram equalization independently on each region. This localized approach effectively highlights image details, as each region’s grayscale histogram is computed separately. To mitigate noise amplification, CLAHE employs a contrast-limiting mechanism. This involves capping the pixel count for each grayscale level within a predefined threshold and redistributing excess pixels, which is crucial for preventing excessive contrast enhancement.
Once the histogram is clipped, it is equalized to enhance local contrast within each block. Bilinear interpolation is then used to merge the processed blocks, ensuring smooth transitions between adjacent regions. The enhanced image retains more details, with smoother transitions in areas like the sky, avoiding the unnatural edge transitions common in traditional histogram equalization. This method significantly improves visual quality and is particularly effective in fields such as medical imaging, remote sensing image analysis, and industrial inspection.

2.3. Impact of CLAHE on Visual Quality

To more intuitively assess the impact of CLAHE on image quality, and to comprehensively analyze the differences between HE and CLAHE, we used metrics such as Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), and information entropy for quantitative evaluation. MSE quantifies error, PSNR evaluates overall image quality, SSIM measures perceptual similarity, and information entropy reflects changes in information content. The respective formulas are provided below:
MSE = 1 m n i = 1 m j = 1 n [ I ( i , j ) K ( i , j ) ] 2
PSNR = 10 · log 10 255 2 MSE
where m and n denote the dimensions of the image, and I ( i , j ) and K ( i , j ) represent the pixel values of the original and the processed images, respectively. The higher the PSNR value, the less the loss in image quality.
SSIM ( x , y ) = ( 2 μ x μ y + C 1 ) ( 2 σ x y + C 2 ) ( μ x 2 + μ y 2 + C 1 ) ( σ x 2 + σ y 2 + C 2 )
where μ x and μ y represent the mean intensities of images x and y, respectively. The terms σ x 2 and σ y 2 denote the variances in these images, and σ x y signifies the covariance between them. To ensure numerical stability and prevent division by zero or extremely small values, which could result in undefined or infinite SSIM values, constants C 1 and C 2 are incorporated into the SSIM calculation.
H ( X ) = i = 1 n p ( x i ) log 2 p ( x i )
where p ( x i ) denotes the probability of the grayscale level x i , and n is the total number of grayscale levels. These metrics collectively offer a robust framework for the quantitative analysis of image quality, essential in various applications ranging from compression to enhancement. The SSIM value ranges from 0 to 1, with values closer to 1 indicating better visual quality of the image.
By combining these metrics, we can thoroughly assess the performance differences of the two algorithms in image processing. We calculated and averaged various metrics using 10,000 images from BOSSbase ver. 1.01. In this study, we employed a 16 × 16 grid of local regions and a clip limit of 0.005 for the CLAHE algorithm to optimize image contrast while suppressing noise amplification. As illustrated in Table 1, in comparison with the HE method, images processed utilizing the CLAHE algorithm demonstrate superior performance metrics, evidenced by higher PSNR and SSIM values, along with reduced MSE values, indicative of a decreased number of pixel alterations. These findings suggest that CLAHE processing is more effective in preserving image details and enhancing image quality, thereby more adeptly fulfilling the requirements of users in practical applications.

2.4. Enhancing Detection Performance

In steganalysis systems, which are framed as binary classification problems, evaluating the performance of detection algorithms is crucial. A key metric in this context is the minimum average decision error rate ( P E ), defined as
P E = 1 2 min P F A ( P F A + P M D )
Here, P F A denotes the False Alarm Rate, which refers to the incorrect classification of an image as containing steganography. P M D represents the Missed Detection Rate, indicating the failure to detect actual steganographic content. A lower P E indicates superior steganalysis detection performance.
The calculation of P E considers the trade-off between these two fundamental error types in steganalysis, aiming to minimize their sum. This metric is particularly useful for systems that need to balance reducing false positives with improving steganography detection efficiency. By optimizing P E , the accuracy and reliability of steganalysis tools can be significantly enhanced, leading to more effective identification and defense against steganographic attacks.
By applying protective operations to images, we can optimize the P E value to some extent, thereby resisting steganographic attacks. To further validate the performance of our proposed defense method, we conducted multiple experiments, demonstrating that digital images treated with the “image vaccine” exhibit stronger resistance in steganalysis, regardless of the type of steganographic operation. The specific experimental details will be presented in Section 3.

3. Experimental Results

3.1. Experimental Setup

To validate the effectiveness of our approach, we conducted multiple sets of controlled experiments. We selected various types of images and datasets for training and testing, including LIRMMBase 256 × 256 , BOSSbase ver. 1.01 [36] and BOWS2 [35]. Since the images in BOSSbase and BOWS2 are 512 × 512 grayscale images, and the UT-GAN [21] steganography algorithm requires input images of 256 × 256 , we resized all original images to 256 × 256 . This ensures the control of variables and facilitates the experiments. In this way, we can more accurately assess the performance of our method across different datasets.
Table 2 summarizes the key characteristics of the datasets used in this study. These datasets are crucial for evaluating the performance of image vaccine processing algorithms, particularly in the context of steganography and steganalysis. Each dataset consists of grayscale images with varying resolutions and formats, which are commonly used benchmarks in the field.
We injected our image vaccine into the original dataset to obtain a protected dataset and conducted experiments to evaluate its effectiveness. Specifically, we selected varying numbers of original images from each dataset for the injection process. To assess the broad applicability of our method to steganography, we used popular steganographic methods WOW [15], S-UNIWARD [16], MiPOD [18], and the machine learning method UT-GAN for data embedding at payloads of 0.1, 0.2, 0.3, 0.4, and 0.5 bpp. The effectiveness of the proposed algorithm in enhancing steganalysis systems was then evaluated by applying existing steganalysis methods for detection and comparing the resulting detection error probabilities ( P E , defined in Equation (3)).
The LIRMMBase256 × 256 datasets were used in the training of the UT-GAN steganography algorithm. We trained multiple models for different payloads and used these models to generate the required stego image datasets.

3.2. Analysis of Experimental Results

To evaluate the effectiveness of our proposed method under different steganalysis techniques, we compared traditional and machine learning-based steganalysis methods. We employed traditional feature extraction techniques such as SPAM [23], SRM [24], SRMQ1 [26], and TLBP [27] to extract feature sets from both original and stego images. These feature sets were then evaluated using an ensemble classifier widely used in steganalysis. Additionally, we tested the machine learning-based Yedroudj-Net [30] algorithm.
In our experimental design, half of the original and stego images were used for model training, with the remainder used for testing.
In this experiment, as depicted in Figure 4 on the following page, we first compared our proposed method with traditional steganalysis methods using the BOWS2 dataset. The figure illustrates the performance differences between our method and traditional methods (SPAM, SRM, SRMQ1, TLBP) on 1000 random images from the BOWS2 dataset, across various steganographic techniques and payload rates (ranging from 0.1 bpp to 0.5 bpp). Please refer to Figure 4 for a visual representation of these comparisons. Detailed numerical results are presented in Table 3, which also begins on the subsequent page. In Figure 4 and Table 3, under different payloads, “Original” represents the undetectability of the original images, while “Proposed” represents the undetectability of images with secret information embedded after applying our image vaccine.
Our experimental analysis yielded compelling insights into the efficacy of our method across a spectrum of steganographic algorithms. The findings underscore the superiority of our approach, which consistently surpasses alternative steganographic analysis techniques at all payload levels. While the enhancements at lower payloads are subtle, the benefits of employing the CLAHE algorithm become increasingly evident as the payload escalates, yielding heightened accuracy and robustness.
This pattern is especially noticeable in the defense against WOW, S-UNIWARD, and MiPOD algorithms, where our method demonstrates a more stable and pronounced performance advantage at medium-to-high payloads. The effectiveness of our approach is further highlighted in its handling of the intricate UT-GAN steganographic method, where it achieves a notable detection edge at lower payloads, exemplified by a reduction in the detection error rate from 0.2598 to 0.1379 at 0.1 bpp. This reduction signifies a heightened sensitivity to steganographic information crafted by adversarial networks.
This improvement is because our method changes the entropy of the images, resulting in a more regular histogram pattern. Such changes make steganographic operations easier to detect, as the increased regularity often reveals hidden information patterns, thereby enhancing the accuracy of steganalysis. In conclusion, our method exhibits superior performance across various steganography algorithms and payload rates, confirming its effectiveness and broad applicability against steganographic attacks.
It is important to acknowledge that our method does not significantly improve the detection of conventional steganographic algorithms at a low embedding rate of 0.1 bpp. This is likely because the subtle impact on local image features makes the effect of CLAHE less pronounced. However, even modest improvements are crucial for practical image security applications. This highlights the reliability of our “universal image vaccine” across various payload levels, confirming its broad utility in digital image security.
To validate the performance of our proposed method across different datasets, we conducted comparisons using the BOSSbase ver. 1.01 dataset with 10,000 images, focusing on four different steganography methods at a payload rate of 0.4 bpp, as illustrated in Figure 5. The experimental results indicate that our method significantly reduces the values of P E and greatly enhances the detection performance of steganalysis algorithms for all tested steganography methods. Particularly, in the case of the Yedroudj-Net algorithm, our proposed method achieves a 100% detection rate for all four types of steganography. These results confirm the robustness and effectiveness of our method across different datasets. The specific values for Figure 5 are detailed in Table 4.
To further investigate the differences between our proposed method and existing deep learning-based steganalysis techniques, we conducted a comparative analysis with Yedroudj-Net under varying payloads. We meticulously controlled experimental parameters, such as image dimensions, formats, and steganographic payloads, to minimize their impact on the results. As shown in Figure 6a, within the BOSSbase ver 1.01 dataset containing 10,000 images, the optimization effect on Yedroudj-Net varies with different payloads. Higher payloads, such as 0.4 and 0.5, result in significant improvements in detection accuracy due to the “Image Vaccine”. We used the CLAHE algorithm to enhance local contrast and regularize the histogram. This process may aid steganalysis algorithms in detecting anomalous patterns, thereby improving detection precision. As a deep learning model, Yedroudj-Net is potentially more sensitive to subtle image changes, allowing it to better identify steganographic content in images processed with the “Image Vaccine”.
Additionally, we examined the impact of different numbers of digital images on our method. Figure 6b presents experiments based on varying sample sizes within the BOWS2 dataset, evaluating our method’s effectiveness against the S-UNIWARD steganography and comparing it with the SRMQ1 steganalysis method. Clearly, whether for 1000 or 9000 images, our method consistently maintained a significantly lower error rate across all tested data volumes, indicating its practical applicability and scalability in handling different data scales.

4. Conclusions

In this study, we explored strategies for the protective processing of digital images to counter steganographic attacks and introduced a “universal image vaccine” scheme. By utilizing the CLAHE algorithm, we enhanced the detection capabilities of existing steganographic analysis systems and improved image visual quality. Our experimental results demonstrated that our method effectively countered both traditional and machine learning-based steganographic attacks, particularly at medium-to-high payloads, significantly enhancing detection capabilities. Specifically, for payloads of 0.1–0.5 bpp, the detection error rate was reduced by an average of 13.43%, 24.70%, 33.79%, 44.50%, and 51.06% for traditional algorithms. Notably, when countering the MiPOD steganographic algorithm at a payload of 0.4 bpp, the Yedroudj-Net algorithm showed a dramatic reduction in detection error rate, decreasing from 0.2570 to 0.0000, achieving 100% detection accuracy and highlighting the robust anti-steganographic performance of our approach. This finding suggested potential applications, such as embedding the processing algorithm into chips, to bolster the security of digital images.
While our approach is intended for broad applicability rather than being customized for specific research contexts, we recognize that its optimization at low embedding rates, particularly at 0.1 bpp, does not match the effectiveness observed at higher bit rates. Moreover, with the advancement of steganography and increasingly complex embedding techniques, future robust algorithms may present new challenges. However, we note that there is a growing body of research dedicated to steganalysis in the low-embedding-rate domain [37,38]. The integration of such algorithms could lead to a more holistic enhancement in performance.
Subsequent research will investigate the enhancement of anti-steganographic efficacy at low payloads and the development of specialized processing methodologies applicable to a range of image modalities, including medical imaging. This endeavor will contribute to the development of an advanced defense system that integrates a range of image vaccine technologies. Furthermore, we aim to assess the adaptability and efficiency of our “universal image vaccine” across diverse applications and its compatibility with existing steganographic analysis tools, with the goal of offering comprehensive solutions to the challenges posed by steganography.

Author Contributions

Conceptualization, S.W. and Z.W.; methodology, S.W.; software, S.W.; validation, S.W. and Z.W.; formal analysis, S.W.; investigation, S.W. and Z.W.; resources, X.Z.; data curation, S.W.; writing—original draft preparation, S.W.; writing—review and editing, Z.W.; visualization, S.W.; supervision, Z.W. and X.Z.; project administration, X.Z.; funding acquisition, Z.W and X.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of China under grants U22B2047 and 62376148, and by the Chenguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission under grant 22CGA46.

Data Availability Statement

The data used in this study are available in publicly accessible repositories. The datasets BOSSBase ver 1.01, BOWS2, and LIRMMBase 256 × 256 can be accessed at the following URLs: BOSSBase ver 1.01: https://dde.binghamton.edu/download/ (accessed: 23 January 2024); BOWS2: https://data.mendeley.com/datasets/kb3ngxfmjw/1 (accessed: 12 February 2024); LIRMMBase 256 × 256 : https://www.lirmm.fr/~chaumont/LIRMMBase.html (accessed: 15 March 2024). The protected data generated during this study were derived from these publicly available datasets.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Johnson, N.F.; Jajodia, S. Exploring steganography: Seeing the unseen. IEEE Comput. 1998, 31, 26–34. [Google Scholar] [CrossRef]
  2. Zhong, X.; Das, A.; Alrasheedi, F.; Tanvir, A. A Brief, In-Depth Survey of Deep Learning-Based Image Watermarking. Appl. Sci. 2023, 13, 11852. [Google Scholar] [CrossRef]
  3. Chang, Y.-F.; Tai, W.-L. Separable Reversible Watermarking in Encrypted Images for Privacy Preservation. Symmetry 2022, 14, 1336. [Google Scholar] [CrossRef]
  4. Majeed, M.A.; Sulaiman, R.; Shukur, Z.; Hasan, M.K. A Review on Text Steganography Techniques. Mathematics 2021, 9, 2829. [Google Scholar] [CrossRef]
  5. Khalifa, A.; Guzman, A. Imperceptible Image Steganography Using Symmetry-Adapted Deep Learning Techniques. Symmetry 2022, 14, 1325. [Google Scholar] [CrossRef]
  6. Alhaddad, M.J.; Alkinani, M.H.; Atoum, M.S.; Alarood, A.A. Evolutionary Detection Accuracy of Secret Data in Audio Steganography for Securing 5G-Enabled Internet of Things. Symmetry 2020, 12, 2071. [Google Scholar] [CrossRef]
  7. Li, M.; Li, Z.; Zhang, Z. A VVC Video Steganography Based on Coding Units in Chroma Components with a Deep Learning Network. Symmetry 2023, 15, 116. [Google Scholar] [CrossRef]
  8. Al Busafi, S.; Kumar, B. Review and Analysis of Cryptography Techniques. In Proceedings of the 9th International Conference on System Modeling and Advancement in Research Trends (SMART), Moradabad, India, 4–5 December 2020; pp. 323–327. [Google Scholar]
  9. Anderson, R.J.; Petitcolas, F.A.P. On the limits of steganography. IEEE J. Sel. Areas Commun. 1998, 16, 474–481. [Google Scholar] [CrossRef]
  10. Shehab, D.A.; Alhaddad, M.J. Comprehensive Survey of Multimedia Steganalysis: Techniques, Evaluations, and Trends in Future Research. Symmetry 2022, 14, 117. [Google Scholar] [CrossRef]
  11. Lin, C.-C.; Mirzaei, M.; Chu, E.-T.; Cheng, C.C. HPDH-MI: A High Payload Data Hiding Technique for Medical Images Based on AMBTC. Symmetry 2024, 16, 1634. [Google Scholar] [CrossRef]
  12. Tuo, Y.; Li, G.; Hou, K. A Symmetric Reversible Audio Information Hiding Algorithm Using Matrix Embedding Within Image Carriers. Symmetry 2024, 16, 1586. [Google Scholar] [CrossRef]
  13. Cheddad, A.; Condell, J.; Curran, K.; McKevitt, P. Digital image steganography: Survey and analysis of current methods. Signal Process. 2010, 90, 727–752. [Google Scholar] [CrossRef]
  14. Pevný, T.; Filler, T.; Bas, P. Using high-dimensional image models to perform highly undetectable steganography. In Proceedings of the 12th International Conference on Information Hiding, Calgary, AB, Canada, 28–30 June 2010; pp. 161–177. [Google Scholar]
  15. Holub, V.; Fridrich, J. Designing Steganographic Distortion Using Directional Filters. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Binghamton, NY, USA, 2–5 December 2012; pp. 234–239. [Google Scholar]
  16. Holub, V.; Fridrich, J. Digital Image Steganography Using Universal Distortion. In Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, New York, NY, USA, 17–19 June 2013; pp. 59–68. [Google Scholar]
  17. Li, B.; Wang, M.; Huang, J.; Li, X. A New Cost Function for Spatial Image Steganography. In Proceedings of the IEEE International Conference on Image Processing, Paris, France, 27–30 October 2014; pp. 4206–4210. [Google Scholar]
  18. Sedighi, V.; Cogranne, R.; Fridrich, J. Content-adaptive Steganography by Minimizing Statistical Detectability. IEEE Trans. Inf. Forensics Secur. 2016, 11, 221–234. [Google Scholar] [CrossRef]
  19. Fridrich, J.; Filler, T. Practical Methods for Minimizing Embedding Impact in Steganography. In Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, February 2007; pp. 2–3. [Google Scholar]
  20. Filler, T.; Judas, J.; Fridrich, J. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 2011, 6, 920–935. [Google Scholar] [CrossRef]
  21. Yang, J.; Ruan, D.; Huang, J.; Kang, X.; Shi, Y. An embedding cost learning framework using GAN. IEEE Trans. Inf. Forensics Secur. 2019, 15, 839–851. [Google Scholar] [CrossRef]
  22. Fridrich, J. Steganography in digital media: Principles, algorithms, and applications. IEEE Trans. Inf. Forensics Secur. 2009, 4, 1–16. [Google Scholar]
  23. Jindal, N.; Liu, B. Review spam detection. In Proceedings of the 16th International Conference on World Wide Web, Banff, AB, Canada, 8–12 May 2007; pp. 1189–1190. [Google Scholar]
  24. Fridrich, J.; Kodovsky, J. Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 2012, 7, 868–882. [Google Scholar] [CrossRef]
  25. Denemark, T.; Sedighi, V.; Holub, V.; Cogranne, R.; Fridrich, J. Selection-channel-aware rich model for Steganalysis of digital images. In Proceedings of the IEEE International Workshop on Information Forensics and Security, Atlanta, GA, USA, 3–5 December 2014; pp. 48–53. [Google Scholar]
  26. Holub, V.; Fridrich, J. Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 2015, 10, 219–228. [Google Scholar] [CrossRef]
  27. Li, B.; Li, Z.; Zhou, S.; Tan, S.; Zhang, X. New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1242–1257. [Google Scholar] [CrossRef]
  28. Xu, G.; Wu, H.; Shi, Y. Structural Design of Convolutional Neural Networks for Steganalysis. IEEE Signal Process. Lett. 2016, 23, 708–712. [Google Scholar] [CrossRef]
  29. Ye, J.; Ni, J.; Yi, Y. Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2545–2557. [Google Scholar] [CrossRef]
  30. Yedroudj, M.; Comby, F.; Chaumont, M. Yedroudj-net: An efficient CNN for spatial steganalysis. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Calgary, AB, Canada, 15–20 April 2018; pp. 2092–2096. [Google Scholar]
  31. Robinette, P.K.; Wang, H.D.; Shehadeh, N.; Moyer, D.; Johnson, T.T. SUDS: Sanitizing Universal and Dependent Steganography. In Proceedings of the 26th European Conference on Artificial Intelligence (ECAI 2023), Kraków, Poland, 30 September–4 October 2023. [Google Scholar]
  32. Chen, J.; Liu, X.; Liang, S.; Jia, X.; Xun, Y. Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection. In Proceedings of the 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Vancouver, BC, Canada, 17–24 June 2023; pp. 2322–2329. [Google Scholar] [CrossRef]
  33. Li, X.; Wang, Z. Vaccine for Digital Images Against Steganography. Sci. Rep. 2024, 14, 21340. [Google Scholar] [CrossRef] [PubMed]
  34. Zuiderveld, K. Contrast limited adaptive histogram equalization. In Graphics Gems; Elsevier: Amsterdam, The Netherlands, 1994; pp. 474–485. [Google Scholar]
  35. Bas, P.; Furon, T.; Cayre, F. Break Our Watermarking System: The BOWS-2 challenge. In Proceedings of the Information Hiding Workshop, Saint Malo, France, 11–13 June 2007; Available online: https://data.mendeley.com/datasets/kb3ngxfmjw/1 (accessed on 12 February 2024).
  36. Bas, P.; Filler, T.; Pevný, T. Break our steganographic system: The ins and outs of organizing BOSS. In International Workshop on Information Hiding; Springer: Berlin/Heidelberg, Germany, 2011; pp. 59–70. [Google Scholar]
  37. Liu, S.; Zhang, C.; Wang, L.; Yang, P.; Hua, S.; Zhang, T. Image Steganalysis of Low Embedding Rate Based on the Attention Mechanism and Transfer Learning. Electronics 2023, 12, 969. [Google Scholar] [CrossRef]
  38. Qian, Y.; Dong, J.; Wang, W.; Tan, T. Learning and Transferring Representations for Image Steganalysis Using Convolutional Neural Network. In Proceedings of the 2016 IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, USA, 16–19 September 2016; pp. 2752–2756. [Google Scholar]
Figure 1. Image vaccine protection scheme against steganography.
Figure 1. Image vaccine protection scheme against steganography.
Symmetry 17 00066 g001
Figure 2. Image vaccine uses CLAHE.
Figure 2. Image vaccine uses CLAHE.
Symmetry 17 00066 g002
Figure 3. Comparison of image enhancement techniques: (a,d) show the original images; (b,e) display the results after applying HE; and (c,f) illustrate the outcomes using CLAHE.
Figure 3. Comparison of image enhancement techniques: (a,d) show the original images; (b,e) display the results after applying HE; and (c,f) illustrate the outcomes using CLAHE.
Symmetry 17 00066 g003
Figure 4. Comparison of our method with traditional steganalytic methods against various steganography techniques on BOWS2: (a) WOW, (b) SUNIWARD, (c) MiPOD, and (d) UT-GAN.
Figure 4. Comparison of our method with traditional steganalytic methods against various steganography techniques on BOWS2: (a) WOW, (b) SUNIWARD, (c) MiPOD, and (d) UT-GAN.
Symmetry 17 00066 g004
Figure 5. Impact of the proposed method on P E against different steganography techniques using BOSSbase v1.01: (a) WOW, (b) SUNIWARD, (c) MiPOD, and (d) UT-GAN.
Figure 5. Impact of the proposed method on P E against different steganography techniques using BOSSbase v1.01: (a) WOW, (b) SUNIWARD, (c) MiPOD, and (d) UT-GAN.
Symmetry 17 00066 g005
Figure 6. (a) Comparison of our method and deep learning-based steganalysis against WOW. (b) Comparison of our method’s performance with varying data sizes against SUNIWARD.
Figure 6. (a) Comparison of our method and deep learning-based steganalysis against WOW. (b) Comparison of our method’s performance with varying data sizes against SUNIWARD.
Symmetry 17 00066 g006
Table 1. Comparison of HE and CLAHE.
Table 1. Comparison of HE and CLAHE.
OriginalHECLAHE
MSE-4826.67502.04
PSNR-12.94 dB21.60 dB
SSIM-0.620.87
Information Entropy6.805.727.17
Table 2. Details of the datasets.
Table 2. Details of the datasets.
DatasetVolumeBit DepthSizeFormat
BOSSBase 1.0110,0008 512 × 512 PGM
BOWS210,0008 512 × 512 PGM
LIRMMBase256 × 25610088 256 × 256 PGM
Table 3. Comparison of our method with traditional steganalytic methods on BOWS2.
Table 3. Comparison of our method with traditional steganalytic methods on BOWS2.
Payload (bpp)
SteganographySteganalysis 0.1 0.2 0.3 0.4 0.5
Original Proposed Original Proposed Original Proposed Original Proposed Original Proposed
WOWSPAM0.49690.45930.47550.39330.45710.42440.42440.26520.38880.2211
SRM0.47840.44530.43390.36740.37950.29230.33360.22410.29180.1743
SRMQ10.48040.43940.44100.35050.39700.27140.35590.20800.31060.1610
TLBP0.48290.46100.45050.39280.40120.32850.35990.26200.31650.2062
S-UNIWARDSPAM0.49400.44670.46780.36620.43670.29430.41030.23110.37250.1788
SRM0.47600.43650.42840.33790.37820.25770.32630.19420.28130.1456
SRMQ10.48020.42050.42990.31900.38720.23850.33880.18530.29310.1361
TLBP0.48480.44890.44720.37070.40580.29080.34720.21660.30320.1677
MiPODSPAM0.49370.42800.48680.34610.46670.28530.44440.23110.42090.1873
SRM0.47720.40590.44360.31730.40970.24210.36590.18820.32690.1493
SRMQ10.48680.39110.45180.29620.41990.22580.38120.17120.34280.1365
TLBP0.48390.41870.46200.33720.42480.26610.38520.21030.34780.1716
UT-GANSPAM0.25980.13790.19770.07460.16620.05170.15760.04420.15030.0356
SRM0.18780.12500.12410.06450.10300.04220.09720.03370.08950.0286
SRMQ10.18410.09130.12460.08490.10330.03640.09510.02850.09000.0238
TLBP0.20850.20630.12440.09120.10860.05760.09730.03950.08770.0376
Table 4. Impact of proposed method on P E with BOSSbase v1.01.
Table 4. Impact of proposed method on P E with BOSSbase v1.01.
Steganography (0.4 bpp)SteganalysisOriginalProposed
WOWSPAM0.37000.1420
SRM0.25650.1463
SRMQ10.26880.1265
TLBP0.28340.1978
Yedroudj-Net0.19400.0
SUNIWARDSPAM0.33700.1106
SRM0.24650.1097
SRMQ10.25240.1121
TLBP0.26470.1516
Yedroudj-Net0.17750.0
MiPODSPAM0.38310.1167
SRM0.29340.1201
SRMQ10.30320.1027
TLBP0.30750.1545
Yedroudj-Net0.25700.0
UT-GANSPAM0.19930.0129
SRM0.11180.0151
SRMQ10.11550.0124
TLBP0.12350.0372
Yedroudj-Net0.09100.0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wei, S.; Wang, Z.; Zhang, X. Universal Image Vaccine Against Steganography. Symmetry 2025, 17, 66. https://doi.org/10.3390/sym17010066

AMA Style

Wei S, Wang Z, Zhang X. Universal Image Vaccine Against Steganography. Symmetry. 2025; 17(1):66. https://doi.org/10.3390/sym17010066

Chicago/Turabian Style

Wei, Shiyu, Zichi Wang, and Xinpeng Zhang. 2025. "Universal Image Vaccine Against Steganography" Symmetry 17, no. 1: 66. https://doi.org/10.3390/sym17010066

APA Style

Wei, S., Wang, Z., & Zhang, X. (2025). Universal Image Vaccine Against Steganography. Symmetry, 17(1), 66. https://doi.org/10.3390/sym17010066

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop